Anti-Fraud Credit/Debit Card Authorization System and Method

a credit/debit card and authorization system technology, applied in the direction of protocol authorisation, instruments, computing, etc., can solve the problems of unauthorized use of credit/debit card, potential danger of information of credit/debit card, and leakage of credit/debit card information to undeired people,

Inactive Publication Date: 2007-11-15
OU XIAOFENG
View PDF11 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0008] In accordance with the present invention, a credit / debit card transaction system implements a two-step authorization approach which requires a card user's approval of a transaction on his / her card in addition to the normal credit / debit card transaction authorization. In this way, unauthorized use of credit / debit card can be stopped.

Problems solved by technology

When a card is lost, its information is potentially in danger.
Furthermore security compromise on the card issuer side could also leak credit / debit card information to undesired people.
Because of the way that a credit / debit card transaction is authorized today, unauthorized use of credit / debit cards become a serious threat.
U.S. Pat. No. 6,095,416 prevents a stolen / lost credit card from being misused, however it can not prevent unauthorized use by people who have access to credit card information via other legitimate methods, for example, by someone who has access to credit card purchase information because of his / her work.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-Fraud Credit/Debit Card Authorization System and Method
  • Anti-Fraud Credit/Debit Card Authorization System and Method
  • Anti-Fraud Credit/Debit Card Authorization System and Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The invention introduces a credit / debit card transaction authorization system and method which aims at stopping fraudulent use of credit / debit card information by requiring the card user's approval of transactions initiated on his / her card.

[0024]FIG. 1 is an illustration of the main functional components of said authorization system, relationship among components and relationship among transaction request initiator 100, said authorization system 101 and card user 102. The main functional components of said authorization system are inside the box of solid lines. Said authorization system has interface components to interact with transaction request initiators and card users. It has an authorization application to control every step of credit / debit card authorization procedures. The databases provide needed information for authorization purposes. All functional components of said authorization system maybe reside on a single system or on different systems connected with networ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a credit/debit authorization system and method which aim at stopping unauthorized use of credit/debit cards. The authorization system and method takes a two-step authorization approach. When a credit/debit card transaction authorization request is routed to the authorization system, the authorization system first validates the transaction by comparing card and transaction amount information extracted from the transaction to the account information stored in an account database. If the transaction is invalid, the authorization system refuses the transaction. If the transaction is valid, the authorization system then determines if the transaction requires the card user's approval. If it does, the authorization system would look up for user contact methods in a user contact database for that card with a pending transaction, establish a communication channel with the card user on his/her personal communication device, inform the user of a pending transaction with transaction related information, ask the user to take appropriate actions to either approve or refuse the transaction and process the user's response. If the user approves the transaction, the authorization system sends an approval code back to the device/system which started the transaction authorization request. If the user refuses the transaction, the authorization system sends a refusal code back to the device/system which started the transaction authorization request. In this way, unauthorized use of credit/debit cards can be stopped.

Description

FIELD OF INVENTION [0001] The invention is related to a credit / debit card authorization system and method which aim at stopping unauthorized credit / debit card usage. BACKGROUND OF THE INVENTION [0002] Credit and debit cards are widely used today. However information required for charge authorization is printed and stored on the cards themselves, such as card number, name and expiration date. When a card is lost, its information is potentially in danger. The same information is also presented at places where financial transactions take places. It means that many non-card users would gain access to it. Furthermore security compromise on the card issuer side could also leak credit / debit card information to undesired people. Because of the way that a credit / debit card transaction is authorized today, unauthorized use of credit / debit cards become a serious threat. [0003] Prior arts have been invented to deal with credit / debit card security. U.S. Pat. No. 5,914,472 uses a smart card techn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06K5/00
CPCG06Q20/40G06Q20/04
Inventor OU, XIAOFENG
Owner OU XIAOFENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products